Sciweavers

1688 search results - page 112 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
IPCCC
2006
IEEE
15 years 10 months ago
Maille authorization - a distributed, redundant authorization protocol
The Maille Authorization protocol provides flexible and reliable authorization in large distributed and pervasive computing systems. Service owners distribute their access control...
Andrew Fritz, Jehan-François Pâris
SAC
2004
ACM
15 years 10 months ago
Web Services for E-commerce: guaranteeing security access and quality of service
Being E-commerce one of the most critical Internet application, it is fundamental to employ technologies which guarantee not only secure transactions but also an adequate quality ...
Mario Bravetti, Roberto Lucchi, Gianluigi Zavattar...
SACMAT
2011
ACM
14 years 7 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
BERTINORO
2005
Springer
15 years 10 months ago
On the Use of Online Analytic Performance Models, in Self-Managing and Self-Organizing Computer Systems
Current computing environments are becoming increasingly complex in nature and exhibit unpredictable workloads. These environments create challenges to the design of systems that c...
Daniel A. Menascé, Mohamed N. Bennani, Hong...
CHI
2011
ACM
14 years 8 months ago
Informing decisions: how people use online rating information to make choices
In this paper we investigate how people use online rating information to inform decision making. We examine whether a theory of searching for information to discriminate between a...
Stelios Lelis, Andrew Howes